Community News: A certain web3 project's contract may have been implanted with malicious code by an employee, resulting in losses of hundreds of thousands of dollars.

robot
Abstract generation in progress

According to a report from the deep tide TechFlow on April 28, a Web3 startup project had hundreds of thousands of USDT transferred away due to a hard-coded authorized wallet address in the smart contracts code, as disclosed by crypto community member Cat (@0xCat_Crypto). In this incident, the contract code submitted by an employee was suspicious, but the employee denied writing the related code, claiming that the malicious code was automatically generated by an AI programming assistant and was not adequately reviewed. Currently, the vesting of the wallet involved cannot be confirmed, and it is also difficult to identify the entity that wrote the code.

Slow Fog Yuxian stated that after preliminary investigation, under the environment using the Cursor and Claude 3.7 models, the AI auto-completed address did not match the malicious address involved, ruling out the possibility of AI code generation being malicious. The malicious address has smart contracts owner permissions, resulting in the complete outflow of funds from the project party.

CAT3.53%
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate app
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)